Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5,684 Hits in 7.5 sec

Artificial-Noise-Aided Message Authentication Codes with Information-Theoretic Security [article]

Xiaofu Wu and Zhen Yang and Cong Ling and Xiang-Gen Xia
2015 arXiv   pre-print
In this paper, we propose a new cryptographic primitive, namely, artificial-noise-aided MACs (ANA-MACs), which can be considered as both computationally secure and information-theoretically secure.  ...  In the past, two main approaches for the purpose of authentication, including information-theoretic authentication codes and complexity-theoretic message authentication codes (MACs), were almost independently  ...  In this paper, we develop a new cryptographic primitive, artificial-noise-aided MACs (ANA-MACs) for ensuring information-theoretic security.  ... 
arXiv:1511.05357v1 fatcat:gwevms6hhfaevmy6fykv6sijfi

Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security

Xiaofu Wu, Zhen Yang, Cong Ling, Xiang-Gen Xia
2016 IEEE Transactions on Information Forensics and Security  
In the past, two main approaches for the purpose of authentication, including information-theoretic authentication codes and complexity-theoretic message authentication codes (MACs), were almost independently  ...  In this paper, we propose a new cryptographic primitive, namely, artificial-noiseaided MACs (ANA-MACs), which can be considered as both computationally secure and information-theoretically secure.  ...  In this paper, we develop a new cryptographic primitive, artificial-noise-aided MACs (ANA-MACs) for ensuring information-theoretic security.  ... 
doi:10.1109/tifs.2016.2524514 fatcat:geyzs4whl5eibo33kii4oywj7i

An Overview of Physical Layer Security With Finite-Alphabet Signaling

Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman
2019 IEEE Communications Surveys and Tutorials  
messages, cognitive multiple access and relay networks.  ...  With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs.  ...  Artificial noise-aided transmit precoding strategies with the objective of maximizing the secrecy rate are proposed in [44] - [47] .  ... 
doi:10.1109/comst.2018.2880421 fatcat:y4kxllk6jrbhjoztuq4hxynzrm

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.  ...  Thus, information-theoretic security is now commonly accepted as the strictest form of security.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.  ...  Thus, information-theoretic security is now commonly accepted as the strictest form of security.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

An Overview of Physical Layer Security with Finite-Alphabet Signaling [article]

Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman
2018 arXiv   pre-print
messages, cognitive multiple access and relay networks.  ...  With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs.  ...  Artificial noise-aided transmit precoding strategies with the objective of maximizing the secrecy rate are proposed in [44] - [47] .  ... 
arXiv:1802.06401v2 fatcat:ribkfxbb7bgklf4zvqp2llhayy

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou, Jia Zhu, Xianbin Wang, Lajos Hanzo
2016 Proceedings of the IEEE  
Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks.  ...  We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues.  ...  Third, we discuss the emerging physical-layer security in wireless communications and highlight the class of information-theoretic security, artificial-noise-aided security, security-oriented beamforming  ... 
doi:10.1109/jproc.2016.2558521 fatcat:yttlvv4vlne5hh5l4zs6qlh2ra

Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise [article]

Francesco Formaggio, Stefano Tomasin
2018 arXiv   pre-print
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.  ...  In particular we superimpose to the navigation signal an authentication signal containing a secret message corrupted by artificial noise (AN), still transmitted by the satellite.  ...  An artificial noise (AN) aided message authentication code is proposed where the AN is quantized and transmitted above the physical layer.  ... 
arXiv:1802.04513v2 fatcat:ym47w6tzsnee3dv3rh5ws47xvq

Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City

Dong Wang, Bo Bai, Kai Lei, Wenbo Zhao, Yanping Yang, Zhu Han
2019 IEEE Access  
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the  ...  Finally, the paper is concluded with some possible future research directions.  ...  Here, the code rate is split into the rate R s of actual secret messages and the rate R e of protection messages with no information content.  ... 
doi:10.1109/access.2019.2913438 fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a

Physical Layer Security: Authentication, Integrity and Confidentiality [article]

Mahdi Shakiba-Herfeh and Arsenia Chorti and H. Vince Poor
2020 arXiv   pre-print
In this survey, we review the aforementioned fundamental aspects of PLS, starting with node authentication, moving to the information theoretic characterization of message integrity, and finally, discussing  ...  Unlike the corresponding classical cryptographic approaches which are all based on computational security, PLS's added strength is that it is based on information theoretic security, in which no limitation  ...  The information theoretic limits of the message authentication problem was first considered by Simmons [29] .  ... 
arXiv:2001.07153v1 fatcat:m6pxtxwl7bbfpf4wiz5hvlnxnq

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

Li Sun, Qinghe Du
2018 Entropy  
Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view,  ...  Communication security is critically important for the operations of IoT.  ...  and use the key as a one-time pad to ensure information-theoretic security.  ... 
doi:10.3390/e20100730 pmid:33265819 pmcid:PMC7512293 fatcat:fd43pygkejdflckeeijhiwfrl4

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
Key issues are discussed along with potential solutions.  ...  However, as the definition and implementation of 5G networks are in progress, many security challenges arise.  ...  Therefore, a data-aided secure downlink transmission scheme was proposed, which achieves significant secrecy rate gains compared with alternative approaches based on matched filter precoding with artificial  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective [article]

Keyvan Ramezanpour, Jithin Jagannath, Anu Jagannath
2022 arXiv   pre-print
We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms.  ...  Hence, all accesses to the network shall be authenticated and authorized within the intra-network security system and is deemed illegal otherwise.  ...  Using artificial noise (AN) with imperfect knowledge of CSI is studied in [70] for hiding a Hash-based message authentication code (HMAC).  ... 
arXiv:2206.14997v1 fatcat:iew3uclwufcxpfi77i3sv4zuje

A Survey on Cooperative Jamming Applied to Physical Layer Security

Michael Atallah, Georges Kaddoum, Long Kong
2015 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)  
Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory.  ...  Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks.  ...  coding and network coding), power allocation, and signal design (artificial noise).  ... 
doi:10.1109/icuwb.2015.7324413 dblp:conf/icuwb/AtallahKK15 fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q

What Physical Layer Security Can Do for 6G Security [article]

Miroslav Mitev, Arsenia Chorti, H. V. Poor, Gerhard Fettweis
2022 arXiv   pre-print
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance.  ...  Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed.  ...  In particular, 1 PLS can provide information-theoretic security guarantees with lightweight mechanisms (e.g., using LDPC, Polar codes, etc.); 2 Hybrid crypto-PLS protocols can provide fast, lowfootprint  ... 
arXiv:2212.00427v1 fatcat:dvfrjqa7gvda3hqxvf6g6emf24
« Previous Showing results 1 — 15 out of 5,684 results